000 | 03539nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-030-62460-6 | ||
003 | DE-He213 | ||
005 | 20240730200600.0 | ||
007 | cr nn 008mamaa | ||
008 | 201110s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030624606 _9978-3-030-62460-6 |
||
024 | 7 |
_a10.1007/978-3-030-62460-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMachine Learning for Cyber Security _h[electronic resource] : _bThird International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II / _cedited by Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXV, 608 p. 246 illus., 181 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12487 |
|
505 | 0 | _aMachine learning -- Security. Privacy-preserving -- Cyber security -- Adversarial machine Learning -- Malware detection and analysis -- Data mining -- AI. | |
520 | _aThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSocial sciences _xData processing. _983360 |
|
650 | 0 |
_aEducation _xData processing. _982607 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Application in Social and Behavioral Sciences. _931815 |
650 | 2 | 4 |
_aComputers and Education. _941129 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aChen, Xiaofeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163975 |
|
700 | 1 |
_aYan, Hongyang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163976 |
|
700 | 1 |
_aYan, Qiben. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163977 |
|
700 | 1 |
_aZhang, Xiangliang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163978 |
|
710 | 2 |
_aSpringerLink (Online service) _9163979 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030624590 |
776 | 0 | 8 |
_iPrinted edition: _z9783030624613 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12487 _9163980 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62460-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96126 _d96126 |